Disconnecting systems from the Internet via an "air gap" is supposed to make the data they store harder to steal. But at Black Hat Europe, cryptographer Adi Shamir demonstrated how a laser and drone can be used to bypass air gaps.
Security experts urge organizations to disable support for SSL on clients and servers because of flaws in the cryptographic protocol that could be used to impersonate website users and decrypt HTTPS traffic.
Knowing how to manipulate a hacker's cultural values could help thwart - or at least slow down - cyber-attacks, says Garet Moravec, a cybersecurity expert who'll speak at ISMG's Global APT Defense Summit on Oct. 22.
Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defense security program be put in place and managed effectively. Here we describe many of the latest complimentary technologies in each area, such as NGF/UTM, DDoS, advanced authentication and...
You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics,...
Exploiting a vulnerability in Microsoft Office, a group of hackers believed to be Russians breached computers operated by the Ukrainian government during September's NATO summit, according to iSight Partners.
Traditionally, big data, analytics and visualization tools have been used after the fact to analyze fraud and security breaches. In this session, we will demonstrate the proactive use of these technologies to help prevent these attacks from occurring in the first place.
Leveraging findings from massive scale,...
In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
JPMorgan Chase CEO Jamie Dimon said Oct. 10 that he expects Chase's annual computer security budget to double from $250 million to $500 million over the next five years in the wake of its massive data breach.
Malware known as "Mayhem" that targets Unix and Linux systems has been updated to exploit Shellshock flaws, security experts warn. But with few Unix-flavor systems running anti-virus software, how can it be stopped?
Kmart has confirmed a breach that started in early September involving a "new form" of malware that infected the company's payment card systems. Find out the details surrounding the incident.
Today's cyber defenses generate a cacophony of security alerts. Some might be useful. Most are not. And telling the difference isn't always easy.
With so many fish in the sea, it can be a challenge to find the meaningful ones. Join us for this webinar as FireEye Managed Defense analysts Nicole Oppenheim and...
Cybersecurity Coordinator Michael Daniel says much of the Obama administration's efforts will involve getting whatever IT security policy passed on whatever vehicle is available as long as the measure is acceptable to the White House.
The ice cream and fast food chain Dairy Queen has confirmed that Backoff point-of-sale malware was used in a payment card breach that affected 395 of its 4,500 franchised U.S. locations. Find out how many cards were affected.
Citigroup, E*Trade, Regions Financial, Fidelity Investments, HSBC, Bank of the West and ADP are now believed to have been probed by the same hackers that targeted Chase, according to news reports. But so far, none of those firms believes data was compromised.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.